Home

Description

Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the Sentry SDK has sendDefaultPii: true it is possible to inadvertently send certain sensitive HTTP headers, including the Cookie header, to Sentry. Those headers would be stored within a Sentry organization as part of the associated trace. A person with access to the Sentry organization could then view and use these sensitive values to impersonate or escalate their privileges within the application. This issue has been patched in version 10.27.0.

PUBLISHED Reserved 2025-11-18 | Published 2025-11-25 | Updated 2025-11-25 | Assigner GitHub_M




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:L

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

>= 10.11.0, < 10.27.0
affected

References

github.com/...script/security/advisories/GHSA-6465-jgvq-jhgp

github.com/getsentry/sentry-javascript/pull/17475

github.com/...ommit/a820fa2891fdcf985b834a5b557edf351ec54539

github.com/getsentry/sentry-javascript/releases/tag/10.11.0

cve.org (CVE-2025-65944)

nvd.nist.gov (CVE-2025-65944)

Download JSON